Sciweavers

3384 search results - page 593 / 677
» More Testable Properties
Sort
View
ICDE
2007
IEEE
134views Database» more  ICDE 2007»
14 years 3 months ago
Apply Model Checking to Security Analysis in Trust Management
Trust management is a form of access control that uses delegation to achieve scalability beyond a single organization or federation. However, delegation can be difficult to contr...
Mark Reith, Jianwei Niu, William H. Winsborough
ICDM
2007
IEEE
135views Data Mining» more  ICDM 2007»
14 years 3 months ago
Private Inference Control for Aggregate Database Queries
Data security is a critical issue for many organizations. Sensitive data must be protected from both inside and outside attackers. Access control policies and related mechanisms h...
Geetha Jagannathan, Rebecca N. Wright
INFOCOM
2007
IEEE
14 years 3 months ago
Cooperating with Smartness: Using Heterogeneous Smart Antennas in Ad-Hoc Networks
Abstract— The ability of smart antennas to improve performance in a typically constrained ad-hoc network environment, has helped them garner significant attention over the last ...
Karthikeyan Sundaresan, Raghupathy Sivakumar
KBSE
2007
IEEE
14 years 3 months ago
Context-aware statistical debugging: from bug predictors to faulty control flow paths
Effective bug localization is important for realizing automated debugging. One attractive approach is to apply statistical techniques on a collection of evaluation profiles of pr...
Lingxiao Jiang, Zhendong Su
LICS
2007
IEEE
14 years 3 months ago
A computable approach to measure and integration theory
We introduce a computable framework for Lebesgue’s measure and integration theory in the spirit of domain theory. For an effectively given second countable locally compact Hausd...
Abbas Edalat